The rise of mobile advertising malware toolkits
In Q4 2012, FortiGuard Labs has highlighted malware samples that show four typical methods cybercriminals are using today to extract money from their victims. In addition, the …
Cybergangs embracing crimeware over social engineering
The APWG reports that there was a constant decline in the number of traditional phishing websites through September 2012, counterfeits usually impersonating well-known …
Most organizations plan to increase number of cloud apps
According to the results of a OneLogin survey on the adoption, use and security of cloud applications, a large majority of respondents, 78%, plan to increase the number of …
Social media has eroded workplace privacy
More than half of adults (53 percent) believe privacy in the workplace has been eroded with the proliferation of social media, reveals AVG. The seventh installment in …
Cisco shows the global picture of information security
Cisco released findings from two global studies that provide a vivid picture of the rising security challenges that businesses, IT departments and individuals face, …
Users trust the cloud with important data
New research from Rackspace shows that Brits may be trusting the cloud as never before with up to £24 billion worth of digital assets stored remotely. According to the …
DDoS attack sizes plateau, complex multi-vector attacks on the rise
Arbor Networks released its 8th Annual Worldwide Infrastructure Security Report (WISR) offering a rare view into the most critical security challenges facing today’s …
48% of IT staff fear unauthorized access to virtual servers
Data security in visualized environments is often neglected by IT organizations, with 48% either reporting or suspecting unauthorized access to files on visualized servers, …
IT challenges with managing increasing amounts of data
Half of all organizations EVault surveyed in the USA, UK, France, Germany, and the Netherlands say they are managing more data now than they were a year ago, and 70 percent of …
People need help controlling personal info online
Microsoft released new data reflecting consumers’ perceptions about how their information is used online and a new series of short videos to help people better manage …
Most exploit kits originated in Russia, say researchers
58 percent of the vulnerabilities targeted by the most popular exploit kits in Q4 were more than two years old and 70 percent of exploit kits reviewed were released or …
DNS attacks increase by 170%
Radware identified a number of new attack methods representative of today’s increasingly sophisticated and severe DDoS threat. Their latest report highlights …
Featured news
Resources
Don't miss
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains
- Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
- October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
- From theory to training: Lessons in making NICE usable